Sciweavers

1422 search results - page 53 / 285
» Information security and risk management
Sort
View
CORIA
2008
13 years 10 months ago
On the use of tolerant graded inclusions in information retrieval
In this contribution, a fuzzy-set-based information retrieval model is considered. First, we show that the retrieval mechanism of such a retrieval model can be defined in terms of ...
Patrick Bosc, Olivier Pivert
FSKD
2006
Springer
298views Fuzzy Logic» more  FSKD 2006»
14 years 16 days ago
Risk Assessment of E-Commerce Projects Using Evidential Reasoning
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...
BPM
2006
Springer
153views Business» more  BPM 2006»
14 years 19 days ago
Shop Floor Information Management and SOA
Service Science is a new term for a new paradigm which aims at the solution of an obvious problem: How to make the increasing fusion of business and IT successful in a dynamically ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
CRITIS
2007
13 years 10 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
COMCOM
2007
83views more  COMCOM 2007»
13 years 9 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini